null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
2330622
ASALTO FINAL - TAKEDOWN
Description
TELEMATICA UNAD - JAIME PRADA
No tags specified
takedown
tc2_301120_24
tc2_jpg
Mind Map by
jprada2001
, updated more than 1 year ago
More
Less
Created by
jprada2001
over 9 years ago
40
0
0
Resource summary
ASALTO FINAL - TAKEDOWN
Un virus puede reproducirse en muchos ordenadores
Todo un arsenal de programas para el pirateo
En el futuro el ciudadano estará más expuesto a las miradas indiscretas
Internet no es más que un gran almacén personal
Facebook
WhatsApp
Instagram
Twitter
Pinterest
Código de gusano y de virus todo en uno = Código de ataque silencioso
CRACKER = "Vandálico Virtual
Programador malicioso y ciberpirata que actúa con el objetivo de violar ilegal o inmoralmente sistemas cibernéticos
TIPOS DE CRAKERS
De Sistemas
De Criptografía
Phreaker
Cyberpunk
TIPOS DE ATAQUES DE UN CRACKER
Ataque a los Sistemas Operativos
Ataque a Nivel de Aplicación
Ataque a Códigos pre-fabricados
Ataques a Sistemas Des-configurados
Media attachments
6450a284-5c0c-40fe-a992-40387388c6e1 (image/png)
6b357c43-7203-4eaa-a129-6d383bbee5f2 (image/png)
7cb12a9e-63cb-465b-a10b-b450e79e4f4e (image/png)
c21e5cae-6ba8-4dfd-8e56-0c1b6433d244 (image/jpg)
334ac955-d8d9-4822-974b-12b06e885824 (image/png)
3eadef56-23a9-4bf7-9528-3c5716e977c9 (image/jpg)
f775a024-368a-4c92-a572-0f87c806b691 (image/jpg)
ad3fde53-a4ec-4517-82ab-b71078f526b7 (image/jpg)
f3289789-e688-4658-8fcf-5a13f351749d (image/jpg)
86d7cd82-c464-41b5-a44e-ee8c87637ed2 (image/jpg)
c4fd2988-63b7-4c14-ace0-bfdbb1c34310 (image/jpg)
dd87d8c1-f745-46b0-9edb-38155f203ca7 (image/jpg)
f4e38294-9bde-4872-9253-4cc2c1fb4345 (image/png)
86f16ac2-84a1-4324-9ddc-a78d424d4199 (image/jpg)
ce8859a5-879a-4ab9-9f25-334b10ee4095 (image/jpg)
ae5fa3ae-acf9-4a90-a3d9-f27072e7bce5 (image/jpg)
88a961dd-c827-4df1-8dfe-a78cab7c1200 (image/jpg)
18f4e43b-5053-438f-a248-9555737170f8 (image/jpg)
3f625783-9978-40bf-b172-9ff3602fd327 (image/jpg)
c36a07d2-bcae-457e-8d4a-ebc3350460a4 (image/jpg)
e04f1c3f-dfbe-43e1-9c59-ff90b3df68b0 (image/jpg)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Crime and Deviance with sociological methods key terms
emzelise1996
A-Level Physics: Course Overview
cian.buckley+1
Principles of basic electrical circuits
Vito Martino
Chemistry Regents - Bonding Theories and Polar Bonds Notes
Ali Kane
Quick tips to improve your Exam Preparation
James Timpson
Modern Studies - Democracy in Scotland/UK.
Daniel Cormack
Key word flashcards
I M Wilson
Poetry revision quiz
Sarah Holmes
Bowlby's Theory of Attachment
Jessica Phillips
CCNA Security 210-260 IINS - Exam 3
Mike M
Specific Topic 7.2 Timber
T Andrews
Browse Library